8.1
CVE-2022-40226
- EPSS 0.21%
- Published 11.10.2022 11:15:10
- Last modified 21.11.2024 07:21:06
- Source productcert@siemens.com
- Teams watchlist Login
- Open Login
A vulnerability has been identified in SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices accept user defined session cookies and do not renew the session cookie after login/logout. This could allow an attacker to take over another user's session after login.
Data is provided by the National Vulnerability Database (NVD)
Siemens ≫ 7kg8500-0aa00-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8500-0aa00-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8500-0aa10-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8500-0aa10-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8500-0aa30-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8500-0aa30-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa01-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa01-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa02-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa02-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa11-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa11-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa12-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa12-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa31-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa31-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa32-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8501-0aa32-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8550-0aa00-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8550-0aa00-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8550-0aa10-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8550-0aa10-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8550-0aa30-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8550-0aa30-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa01-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa01-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa02-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa02-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa11-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa11-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa12-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa12-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa31-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa31-2aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa32-0aa0 Firmware Version < 3.10
Siemens ≫ 7kg8551-0aa32-2aa0 Firmware Version < 3.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.21% | 0.432 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
|
productcert@siemens.com | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-384 Session Fixation
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.